WiFi Network Intrusion Protection

855 Views | 3 Replies | Last: 2 yr ago by MRB10
MRB10
How long do you want to ignore this user?
AG
Are there any easy things I can do to increase my home networks protection levels? I currently have a mesh system with a decent password and run pi hole. Asking because I've started getting multiple notifications per day indicating that the mesh software prevented an intrusion attempt from various IPs.

TIA
“There is no red.
There is no blue.
There is the state.
And there is you.”

“As government expands, Liberty contracts” - R. Reagan
Lathspell
How long do you want to ignore this user?
AG
Better passwords or change your network to static IP instead of DHCP. If static, you have to manually input each IP address on the device that wants to join your network, but you should know them all. Create a guest network for your wifi for any guests.

Granted, most people don't know how to do any of that and it's a pain in the ass, but it would secure your network.

As long as you have a decent wifi password, you should be fine. You are at a much greater risk from external threats from the websites you go to.
eric76
How long do you want to ignore this user?
AG
If you are receiving notices of connection attempts from various IP addresses outside your network, your router is almost surely accepting accepting connections from the Internet to your WAN. If it was someone trying to connect to your wifi, the addresses would be in address block assigned by the DHCP on the router.

For outside attempts, you should block any and all attempts to connect to your WAN address. Unless you are managing your router from another location, there is likely no reason for the WAN address to be accepting connections. I don't know if there are any modern routers that do not have the ability to block incoming connections to the WAN address.

If it is someone trying to connect to your wifi, you can often block the wifi router from broadcasting your Access Point name. If that is blocked, any attacker would have to know the name of your Access Point in order to connect.
MRB10
How long do you want to ignore this user?
AG
There are two IPs and these are the classifications…

WEB Remote Command Execution via Shell Script -1.h

WEB Remote File Inclusion /etc/passwd

Not sure if this tells you anything. I run a Bitcoin node, and have for a few years, but I haven't seen this before. It could be that I suppose.
“There is no red.
There is no blue.
There is the state.
And there is you.”

“As government expands, Liberty contracts” - R. Reagan
Refresh
Page 1 of 1
 
×
subscribe Verify your student status
See Subscription Benefits
Trial only available to users who have never subscribed or participated in a previous trial.